Information that was the objective for penetration (identity theft, intellectual property)

The process of getting the data out can be as simple as sending an email or uploading a file or posting to web site. It can also be carried out physically in printed format or electronic format on a flash drive or CD.

In some cases, there is also a need for covert data transfer. The attacker can use encryption or steganography to hide the data. Covert channels can use a variety of techniques to bypass protection or detection including hiding data in unusual areas of common protocols.

Solve the puzzle

Random Quote

“If you have an apple and I have an apple and we exchange apples then you and I will still each have one apple. But if you have an idea and I have an idea and we exchange these ideas, then each of us will have two ideas.”